0% found this document useful (0 votes)
264 views12 pages

Institute of Engineering & Technology: Instructions

This document contains a 67 question technical quiz about computers and technology. The quiz covers topics like binary systems, computer components, operating systems, networking, programming languages, and file formats. Test takers are instructed to answer each multiple choice question in 30 minutes, with correct answers earning 2 marks and incorrect answers deducting 1 mark.

Uploaded by

Ashutosh Raina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
264 views12 pages

Institute of Engineering & Technology: Instructions

This document contains a 67 question technical quiz about computers and technology. The quiz covers topics like binary systems, computer components, operating systems, networking, programming languages, and file formats. Test takers are instructed to answer each multiple choice question in 30 minutes, with correct answers earning 2 marks and incorrect answers deducting 1 mark.

Uploaded by

Ashutosh Raina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Institute of Engineering & Technology

TECH PAPER







Name: ____________________________
Branch: _______________ Year: ______



Instructions
1. Correct answer carries 2 marks.
2. Wrong answer carries -1 marks.
3. Time for this question paper is 30 min.





Q. 1 The binary system uses powers of
A. 2
B. 10
C. 8
D. 16

Q. 2
Restarting a computer may also be called what?
A Cold booting
B Warm booting
C Safe booting
D Fast booting

Q. 3
How many bytes are in a kilobit?
A 8
B 100
C 128
D 1,000

Q. 4
What type of wireless technology is used to create a piconet?
A Wi-Fi
B Cellular
C Bluetooth
D Infrared

Q. 5
What is another name for a search term entered into a search engine?
A Query
B Post
C Thread
D SERP

Q. 6
What type of component might use an X86 architecture?
A HDD
B SSD
C CPU
D RAM



Q. 7
Which is a type of Electrically-Erasable Programmable Read-Only Memory?
A Flash
B Flange
C Fury
D FRAM

Q. 8
Who developed Yahoo?
A Dennis Ritchie & Ken Thompson
B David Filo & Jerry Yang
C Vint Cerf & Robert Kahn
D Steve Case & Jeff Bezos

Q. 9
'.I NI ' extension refers usually to what kind of file?
A Image file
B System file
C Hypertext related file
D Image Color Matching Profile file

Q. 10
Who co-founded Hotmail in 1996 and then sold the company to Microsoft?
A Shawn Fanning
B Ada Byron Lovelace
C Sabeer Bhatia
D Ray Tomlinson

Q. 11
Compact discs, (according to the original CD specifications) hold how many minutes of
music?
A 74 min
B 56 min
C 60 min
D 90 min

Q. 12
'. BAK' extension refers usually to what kind of file?
A Backup file
B Audio file
C Animation/movie file
D MS Encarta document

Q. 13
Who co-created the UNIX operating system in 1969 with Dennis Ritchie?
A Bjarne Stroustrup
B Steve Wozniak
C Ken Thompson


D Niklaus Wirth
Q. 14
'. BAT' extension refers usually to what kind of file?
A Compressed Archive file
B System file
C Audio file
D Backup file

Q. 15
What does EPROM stand for?
A Electric Programmable Read Only Memory
B Erasable Programmable Read Only Memory
C Evaluable Philotic Random Optic Memory
D Every Person Requires One Mind

Q. 16
Which of the following computer language is used for artificial intelligence
A FORTRAN
B PROLOG
C C Language
D COBOL

Q. 17
From what location are the 1st computer instructions available on boot up
A ROM BIOS
B CPU
C boot.ini
D CONFIG.SYS

Q. 18
Software programs installed unknowingly or unintentionally are also called what?
A Shareware
B Scareware
C MODs
D PUPs

Q. 19
Which of the following is not an example of a bitrate?
A 320 kbps
B 128 Kbps
C 64 kbps
D 360 kbps

Q. 20
Which is based on peer to peer server technology?
A E-mail
B SNS


C Torrent
D Search Engines

Q. 21
Which of the following statements best describes third party software?
A Software that runs on multiple platforms.
B Software that runs on hardware developed by a different company.
C Software that has not yet completed the testing phase.
D Software that is distributed illegally.

Q. 22
What service translates multiple IP addresses in a LAN to a single I P address?
A DNS
B NAT
C XSLT
D HTTP

Q. 23
What is another name for a storage device?
A Memory
B Volume
C Dropbox
D Vault

Q. 24
Which of the following is a valid I P address?
A 123.456.789.012
B 12.34.56.78
C 255.0.1
D 169.174.190

Q. 25
What does the "X" in XHTML stand for?
A Extra
B Extensible
C Extreme
D Executable

Q. 26
What setting defines the spacing between characters of a font?
A Kerning
B Tracking
C Word spacing
D Line height

Q. 27
What type of data is stored in a TIFF file?
A Audio Data
B Video Data


C Image Data
D Textual Data

Q. 28
Which of the following resolutions might be used by a 16:9 display?
A 640x480
B 1024x768
C 1440x900
D 1920x1080

Q. 29
UTF is a collection of what type of standards?
A Character Encodings
B File Formats
C Icon Designs
D Cascading Style Sheets

Q. 30
A golden master, or "GM," refers to what type of product?
A CPU
B Motherboard
C Software Program
D Firewall

Q. 31
What is the central location where a version control system saves files called?
A Bash
B Repository
C Bank
D Bin

Q. 32
Which of the following Wi -Fi standards was standardized most recently?
A 802.11a
B 802.11ac
C 802.11n
D 802.11n

Q. 33
What do software developers use OpenGL to create?
A Game sprites
B Clip art
C 3D animations
D Photo filters

Q. 34
Which of the following formats supports the least number of colors in a single image?
A GIF
B JPEG


C JPEG 2000
D PNG-24

Q. 35
What type of code is not processed by a Web browser?
A HTML
B XHTML
C PHP
D JavaScript
Q. 36
Which of the following statements about Bit Torrent is false?
A It is peer-to-peer (P2P) file sharing protocol.
B It was designed as a replacement for the HTTP protocol.
C It allows users to download single files from multiple server at one time.
D It supports resuming downloads that have been paused or stopped

Q. 37
What is the purpose of an access control list ( ACL)?
A It defines user permissions for files and folders.
B It limits computer access to registered users.
C It contains login information for a single user.
D It prevents specific users from accessing a network.

Q. 38
The POP3 protocol is used for what Internet service?
A Web Hosting
B Email
C File Transfers
D Firewalls

Q. 39
What is the most common target of denial of service attacks?
A Personal Computers
B Mail Servers
C Name Servers
D Web Servers

Q. 40
Which of the following social media services is designed for business networking?
A Omegle
B Twitter
C VK
D LinkedIn



Q. 41
Which protocol is used by network devices, such as routers to send error messages
indicating, for example, that a requested service is not available or that a host or router
could not be reached?
A UDP
B TCP
C ICMP
D IP

Q. 42
Which of the following best describes pseudocode?
A It has highly strict syntax.
B It is a type of machine language.
C It is used to port software between operating systems.
D It contains phrases that are universally understood.

Q. 43
Which of the following best describes a bitmap?
A A vector image
B A raster image
C An uncompressed video file
D A compressed video file

Q. 44
What system is specifically used to manage multiple versions of programs and files?
A File Manager
B Windows Explorer
C Version Control
D Finder

Q. 45
What is the function of the address resolution protocol ( ARP)?
A It translates domain names to IP addresses.
B It converts IP addresses to hostnames.
C It translates hostnames to GUIDs.
D It converts IP addresses to MAC addresses

Q. 46
Which of the following does CTP measure?
A Processor performance
B Data transfer speeds
C Media read/write performance
D Hardware failure rates

Q. 47
What is a search engine that searches multiple search engines called?
A Meta Search Engine
B Universal Search Engine
C Search Portal


D Search Station
Q. 48
What is the small icon next to a URL or page title in a web browser called?
A Bookmark
B Placeholder
C Favicon
D Webicon

Q. 49 To deliver a message to the correct application program running on a host , ...............
address must be consulted.
A Port
B Physical
C IP
D None

Q. 50
What type of port did PCs use for connecting keyboards and mice before USB?
A FireWire
B VGA
C SCSI
D PS/2

Q. 51
Which computer company is called big blue?
A Adobe
B Microsoft
C IBM
D Google

Q. 52
What does pptp stand for?
A Peer to Peer Transfer Protocol
B Point to Point Transfer Protocol
C Point to Point Tunneling Protocol
D Peer to Point Tunneling Protocol

Q. 53
What is the extension of Excel File?
A .exl
B .xel
C .xls
D .doc




Q. 54
What does a DLL file contain?
A User preferences
B System settings
C Temporary data
D A library of functions

Q. 55
How many bytes are in an SI megabyte?
A 1,000
B 1,024
C 1,000,000
D 1,048,576

Q. 56 What is the purpose of metadata?
A It logs system events.
B It is used to convert data from one format to another.
C It serves as a backup of the original data.
D It describes other data.

Q. 57
Which technology allows you to convert a scanned document into a text file?
A OCR
B FTP
C TTF
D CRT

Q. 58
What does a 404 error in a Web browser indicate?
A You are not connected to the Internet.
B The website you are visiting has been blocked.
C The server you are connecting to is not responding.
D The specific page you visited cannot be found.

Q. 59
A temporary storage area that contains a queue of jobs is also called what?
A Package
B Archive
C Bus
D Spool

Q. 60
What is the process of smoothing out digital noise in graphics called?
A Refracting
B Dithering
C Rounding
D Flattening



Q. 61
What type of computer would most likely contain a folder named "cgi-bin"?
A A Windows desktop computer
B A Linux-based web server
C A thin client
D A CGI workstation

Q. 62
What component does DMA bypass?
A The motherboard
B The CPU
C The system RAM
D The system bus

Q. 63
X12, TRADACOMS, and EDIFACT are different formats of what standard?
A FTP
B MTU
C EDI
D LTE

Q. 64
What is the technical name for a "rule of thumb?"
A Mnemonic
B Heuristic
C Template
D Sample

Q. 65
What language is designed to be a client-side scripting language?
A PHP
B JavaScript
C C++
D Delphi

Q. 66
What is the term "abend" short for?
A Algorithm bend
B Arithmetic bend
C Abnormal end
D Absolute end

Q. 67
What is the standard file system used by compact discs called?
A CD-ISO
B CD-ROM
C CDFS
D CDRW



Q. 68
Which of the following statements best describes video interlacing?
A Displaying a split-screen video in a single frame
B Displaying every other horizontal line of a video
C Crossfading between video clips
D Applying color filters to live video

Q. 69
What are small bitmap graphics used in software applications called?
A Sprites
B Vectors
C Layers
D Pixels

Q. 70
Which of the following interfaces provides a digital connection?
A VGA
B HDMI
C Composite
D Component

You might also like